You are on page 1of 9

Chapter 1 – 1.

3
Information assurance :

is achieved only when the information and its systems


are protected against attacks by means of the
application security.
+ +
CONFIDENTIALITY
 Refer to preventing the disclosure of
information to unauthorized individuals or
systems.

 E.g : Credit Card Transaction on the


internet
INTEGRITY
 Maintaining and assuring the accuracy
and consistency of data over its entire
life cycle.
 This mean that data cannot be modified
in an unauthorized or undetected
manner.
 E.g : Amount transacted on the internet
AVAILIABILITY
 For any information system to serve its
purpose, the information must be available
when it is needed. This means that the
computing systems used to store and
process the information, the security
controls used to protect it, and the
communication channels used to access it
must be functioning correctly.
NON-REPUDIATION
 In law, non-repudiation implies one’s
intention to fulfill their obligations to
contract.
 It also implies that one party of
transaction cannot deny having received
a transaction nor can the other party
deny having sent a transaction.
 E.g : Cyptographic System
AUTHENTICATION
 It is necessary to ensure that the data,
transaction, communications or
documents are genuine.
 It is also important for authenticity to
validate that both parties involve are
who they claim to be.
 E.g : Digital Signature

You might also like